January 10, 2013

PTI Assignment chapter 11

Rickvian Aldi / 1601253441 / 01PBT

True or False
1.      False 
2.      True
3.      False
4.      True
5.      False
6.      True
7.      True
8.      True
9.      False
10.  False
11.  True
12.  False

Multiple Choice
1.      B
2.      D
3.      A
4.      C
5.      C
6.      D
7.      D
8.      C

Matching
1.      J
2.      D
3.      E
4.      G
5.      I
6.      C
7.      B
8.      A
9.      H
10.  F

Short answer
1.-One technique that antivirus programs use to identify a virus is to look for virus signatures. A virus signature, also called a virus definition, is a known specific pattern of virus code. Computer users should update their antivirus program’s signature files regularly. A virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.

2.-Energy star is a green computing program made by the US, ensuring all the computer and peripherals are energy-efficient. User should not store obsolete computer in the basement or warehouse, because obsoletes computer contains toxic.

3.-Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. 
§   Fill in only necessary information on rebate, warranty, and registration forms.
§  Do not pre-print your telephone number or Social Security number on personal checks.
§  Have an unlisted or unpublished telephone number.
§  If Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.
§  Do not write your telephone number on charge or credit receipts.

4. –Avoid contacting suspicious message.
- Any legitimate message or so looks-alike should be checked in the official site

5. Clickjacking is an object or link. which often contain links, picture that contains malicious program.
-Internet Content Rating Association (ICRA) rates whether a website is malicious, eligible  or not.



PTI Assignment chapter 10


Rickvian Aldi / 1601253441 / 01PBT

True/False
1.True
2. True
 3. False 
4.True
5. False
6. False
7. True
8. True
9. False
10. True
Multiple Choices
1. B
2. A
3. D
4. B
5. A
6. B
7. B
8. A
Matching
1.  E
2.  G
3.  C
4.  B
5.  J
6.  A
7.   I
8.  D
9.  H
10. 

Short Answer
1. -Validation is the process of comparing data with a set of rules or values to find out if the data is correct.
-Five types of validity checks: Alphabetic checks, Numeric checks, Range checks, Consistency checks, Completeness checks.

2. -In data redundancy each department or area in an organization has its own files in a file processing system, by duplicating data it wastes resources such as storage space and people’s time, also data redundancy can increase the chance of error.
-Isolated data often it’s difficult to access data stored in separate files in different department. Sharing data from multiple, separate files to generate such a list in a file processing system often is a complicated procedure and usually requires the experience of a computer programmer.

3. -When an organization uses a database approach, many programs and users share the data in the database.
-Five strengths of the database approach:
- Reduces Data Redundancy, most data items are stored in only one file, which greatly reduces duplicated data.
-Improved data Integrity, when users modify data in the database, they make change to one file instead of multiple files.
-Shared data, The data in a database environment belongs to and is shared, usually over a network, by the entire organization.
-Easier Access, the database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges.
-Reduces Development Time, it often is easier and faster to develop programs that use the database approach.

4. -How to use a Simple Query Wizard:
-Select the fields from the Available Fields list you want to be displayed in the resulting query.
-Assign a name to the query, so that you can open it later.
-View the query result on the screen.
-Query by example is a feature that has a graphical user interface to assist users with retrieving data.

5.   Advantages of object-oriented database:
-They can store more type of data, access this data faster, and allow programmers to reuse object.

Four examples of object-oriented database:
-A multimedia database stores images, audio clips, and/or video clips, for example, a GIS database stores maps and other geographic data.
-A groupware database stores documents such as schedules, calendars, manuals, memos, and reports.
-A computer-aided design database stores data about engineering, architectural, and scientific design.
-A hypertext database contains text links to other types of documents. A hypermedia database contains test, graphic, video, and sound.


PTI Assignment chapter 9


Rickvian aldi / 1601253441 / O1PBT

True/False
1. True
2. False
3. True
4. False
5. True
6. True
7. False
8. True
9. False
10. True
11. True

Multiple Choice
1. C
2. C
3. C
4. D
5. B
6. A
7. D
8. B

Matching
1. E
2. J
3. H
4. D
5. F
6. A
7. G
8. B
9. C
10. I

Short Answer
1.-Text messaging is a process where users sends and receives short text messages, typically fewer than 300 characters, on a phone or other mobile device or computer.
-Mobile to Mobile: send a message from your mobile device to another mobile device. -Mobile to E-Mail: send a message from your mobile device to an e-mail address anywhere in the world. Web to Mobile: send a message from a text messaging Web site to a mobile device, or request that a Web site alert a mobile device with messages of breaking news and other updates, such as sports scores, stock prices, and weather forecasts. Mobile to Provider: send a message by entering a common short code (CSC), which is a four- or five-digit number assigned to a specific content or wireless service provider, followed by the message, such as a vote for a television program contestant or an entry for a sweepstakes. 2 GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS receiver. GPS receiver (such as in a car, a wearable device, a smart phone, a handheld device, or a collar) determines its location on Earth by analyzing at least 3 separate satellite signals from the 24 satellites in orbit.
-Individuals use GPS technology by using smart phones or GPS receiver.
3. A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building, or closely positioned group of buildings. A metropolitan area network (MAN) is a high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across that region. A wide area network (WAN) is a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
-A wireless LAN (WLAN) is a LAN that uses no physical wires.
4.-A network topology refers to the layout of the computers and devices in a communications network.
-Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM.
5.-Three types of digital modems are ISDN modems, DSL modems, and cable modems.
-An ISDN modem sends digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line. A DSL modem sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line. A cable modem, sometimes called a broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network.